Premium Only Content
Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:58
Prepping With KSG
3 years agoHerbs A Growin'!
42 -
LIVE
SynthTrax & DJ Cheezus Livestreams
14 hours agoFriday Night Synthwave 80s 90s Electronica and more DJ MIX Livestream SYNTHWAVE / ANIME NIGHT
184 watching -
14:25
Tactical Advisor
12 hours agoReal Life John Wick Suit | Grayman & Company
3.84K1 -
LIVE
I_Came_With_Fire_Podcast
11 hours agoAlien Enemies Act | Dismantling the Department of Education | Valhalla VFT & America First
187 watching -
19:53
MetatronHistory
2 hours agoRome VS Greece - Ultimate Clash of Civilizations Explained
1.26K -
33:09
Exploring With Nug
4 hours ago $2.84 earnedThey Weren’t Ready for Nightfall on Blood Mountain… So I Helped Them Down
21K1 -
1:16:42
Sarah Westall
3 hours agoBoardroom and Government Infiltration: The Silent Erosion of American Power w/ Mike Harris
11.6K1 -
LIVE
JahBlessCreates
1 hour ago🎉WE BACK!! MUSIC | VIBES | GAMES
31 watching -
LIVE
XDDX_HiTower
1 hour agoR.E.D FRIDAY!! TIME FOR WAR! [RGMT CONTENT Mgr. | RGMT GL | GZW CL]
13 watching -
LIVE
Cewpins
1 hour agoFRIDAY CrossFade PARTY!!🔥weed + dabs + prosecco🍃420💨!MJ
40 watching